Quick Start: See PRESENTATION_GUIDE.md for a streamlined demo workflow
- ✅ iPad Air Gen 1 (As of 10/27/2022)
| Device | Model | Confirmed Date | Contributor |
|---|---|---|---|
| iPad Mini 3 | - | 01/13/2025 | adamk324 |
| iPad Mini 2 | - | 02/26/2025 | ManiProjs |
| iPad Air | - | 04/07/2025 | VSjnk |
| iPhone 5s | - | 04/13/2025 | daodov |
| iPhone 6 | - | 09/08/2025 | lamduck2005 |
| iPhone 6 Plus | A1522 | 07/29/2025 | R3p1ns |
| iPad Air Gen 1 | A1475 | 09/27/2025 | elvisef |
- A7 device (iPhone 5s, 6, 6 Plus, iPad Air, iPad Mini 2/3)
- Computer running Windows, Linux, or macOS
- USB cable
┌─────────────┐ ┌──────────────┐ ┌─────────────┐
│ Jailbreak │ ──> │ Setup Proxy │ ──> │ Bypass │
│ (Checkra1n)│ │ (Any OS) │ │ Activation │
└─────────────┘ └──────────────┘ └─────────────┘
- Jailbreak with Checkra1n 0.10.2
- Run setup and transfer scripts:
# Terminal 1: Start proxy ./setup_proxy.sh # Terminal 2: Transfer files and bypass ./transfer_files.sh ssh root@127.0.0.1 -p 2222 # Password: alpine cd /var/root && ./bypass_device.sh # Terminal 3: Transfer patch ./transfer_patch.sh # Back in Terminal 2 SSH session ./finalize_bypass.sh
- Complete by tapping "Connect to iTunes"
- Jailbreak with Checkra1n 0.10.2
- Run
setup_proxy.ps1in PowerShell - Use WinSCP to transfer files and follow on-screen instructions
- Complete by tapping "Connect to iTunes"
Download Checkra1n:
- Recommended: Checkra1n 0.10.2
- Alternative: Bootra1n 10.2 (Bootable USB option)
Jailbreak Process:
- Connect device to computer
- Run Checkra1n and follow on-screen instructions
- Device will enter DFU mode
Important Troubleshooting:
⚠️ Known Issue: Freezing at "Right Before Trigger (this is the real bug setup)"Solution:
- Wait ~15-20 seconds at the "Right Before Trigger..." screen
- Unplug the device
- Wait 1-2 seconds
- Plug device back in
- You should immediately see "Booting Up"
- If not, restart the jailbreak process
- If repeated failures occur, restore iOS firmware in iTunes and retry
Choose your operating system:
Install libimobiledevice:
Ubuntu/Debian:
sudo apt update
sudo apt install libusbmuxd-tools libimobiledevice-utilsFedora/RHEL:
sudo dnf install libusbmuxd-utils libimobiledevice-utilsArch Linux:
sudo pacman -S libusbmuxd libimobiledevicemacOS (with Homebrew):
brew install libusbmuxd libimobiledeviceOptional (for automated file transfer):
# Ubuntu/Debian
sudo apt install sshpass
# Fedora/RHEL
sudo dnf install sshpass
# macOS
brew install hudochenkov/sshpass/sshpassStart Proxy:
./setup_proxy.shKeep this terminal open!
Download Required Tools:
- libimobiledevice - Download v1.3.17
- WinSCP - For file transfer to device
Setup:
- Extract
libimobiledevice.1.2.1-r1122-win-x64.zip - Open PowerShell in the extracted directory
Option A: Automated (Recommended)
.\setup_proxy.ps1Option B: Manual
.\iproxy.exe 22 44- Port 22 = Local masquerade port
- Port 44 = SSH port on device (Checkra1n default)
Keep this PowerShell window open!
On Device: Navigate to "Choose a Wi-Fi Network" screen
⚠️ DO NOT connect to WiFi yet
Terminal 1 (already running from Step 2):
./setup_proxy.sh # Keep this runningTerminal 2 - Transfer files and start bypass:
# Transfer bypass scripts to device
./transfer_files.sh
# SSH into device
ssh root@127.0.0.1 -p 2222
# Password: alpine
# On device, run bypass script
cd /var/root
./bypass_device.sh
# Leave this SSH session openTerminal 3 - Transfer patched file:
./transfer_patch.shBack in Terminal 2 (SSH session):
# Finalize the bypass
./finalize_bypass.shOn Device: Tap "Connect to iTunes" at bottom of WiFi screen ✓
Connect to Device:
Open a second PowerShell window and connect via SSH:
ssh root@127.0.0.1Password: alpine
Setup WinSCP:
- Protocol: SCP
- Host:
127.0.0.1 - User:
root - Password:
alpine
-
Transfer scripts to device via WinSCP:
bypass_device.sh→/var/root/finalize_bypass.sh→/var/root/
-
In SSH session, run:
cd /var/root chmod +x bypass_device.sh finalize_bypass.sh ./bypass_device.sh -
Transfer patched file via WinSCP:
- Transfer
mobileactivationdto/usr/libexec/mobileactivationd
- Transfer
-
Finalize bypass:
./finalize_bypass.sh
-
On device: Tap "Connect to iTunes" at bottom of WiFi screen
Phase 1 - Prepare Device:
mount -o rw,union,update /
launchctl unload /System/Library/LaunchDaemons/com.apple.mobileactivationd.plist
rm /usr/libexec/mobileactivationd
uicache --allPhase 2 - Transfer File:
- Using WinSCP, transfer
mobileactivationdto/usr/libexec/mobileactivationd
Phase 3 - Finalize:
chmod 755 /usr/libexec/mobileactivationd
launchctl load /System/Library/LaunchDaemons/com.apple.mobileactivationd.plistComplete:
- On device, tap "Connect to iTunes" at bottom of "Choose a Wi-Fi Network" screen
This repository includes automation scripts to streamline the bypass process:
| Script | Platform | Purpose |
|---|---|---|
setup_proxy.sh |
Linux/macOS | Automatically starts iProxy with correct ports |
setup_proxy.ps1 |
Windows | Automatically starts iProxy with correct ports |
transfer_files.sh |
Linux/macOS | Transfers bypass scripts to device |
transfer_patch.sh |
Linux/macOS | Transfers patched mobileactivationd to device |
bypass_device.sh |
Device (SSH) | Automates Phase 1 commands |
finalize_bypass.sh |
Device (SSH) | Automates Phase 3 commands |
Benefits:
- ✅ Cross-platform support (Windows, Linux, macOS)
- ✅ Reduces human error
- ✅ Faster execution
- ✅ Visual progress indicators
- ✅ Error checking at each step
- ✅ Automated file transfer (Linux/macOS)
- Ensure iProxy is running
- Verify device is jailbroken (Checkra1n app should be visible)
- Try reconnecting USB cable
- Restart iProxy
- Ensure you're logged in as
root - Check that filesystem is mounted read-write:
mount -o rw,union,update /
- Verify
mobileactivationdwas transferred to correct location:/usr/libexec/mobileactivationd - Check file permissions:
ls -la /usr/libexec/mobileactivationd(should show-rwxr-xr-x) - Try restarting device and re-running finalization script
These instructions were compiled from multiple sources. Special thanks to:
- iOS-Hacktivation - Source of the patched
mobileactivationdbinary - Checkra1n Team - Jailbreak tool
- libimobiledevice Project - Device communication libraries
- Community Contributors - All those who tested and confirmed device compatibility
This tool is for educational and research purposes only. Use only on devices you own or have explicit permission to modify. Bypassing activation locks on devices you don't own may be illegal in your jurisdiction.
iOS_ActivationBypass/
├── README.md # Complete documentation
├── PRESENTATION_GUIDE.md # Quick reference for demos
├── mobileactivationd # Patched activation daemon binary
├── libimobiledevice.*.zip # Windows libimobiledevice tools
│
├── Linux/macOS Scripts:
│ ├── setup_proxy.sh # Start iProxy (Linux/macOS)
│ ├── transfer_files.sh # Auto-transfer bypass scripts
│ └── transfer_patch.sh # Auto-transfer patched file
│
├── Windows Scripts:
│ └── setup_proxy.ps1 # Start iProxy (Windows)
│
└── Device Scripts (Run via SSH):
├── bypass_device.sh # Phase 1: Prepare device
└── finalize_bypass.sh # Phase 3: Complete bypass